Learning Paths
Structured progressions from L1 triage to L3 threat hunting, AI red teaming, and IR leadership.
SOC Analyst Foundations
Alert triage methodology, SIEM query fundamentals (Splunk SPL, KQL), log source onboarding, and ticket escalation frameworks.
Threat Hunting, DFIR & AI Security
Hypothesis-driven threat hunting, memory forensics, MITRE ATT&CK hunt playbooks, LLM prompt injection detection, and AI model security assessment.
SOC Engineering, Web3 & Leadership
Detection engineering (Sigma, YARA), SOC metrics, purple team exercises, blockchain forensics, smart contract exploit analysis, and CISO-level reporting.
Latest Playbooks
NIST 800-61r2 mapped. Severity tagged. Covers ransomware, BEC, AI-generated phishing, and crypto exploits.
Playbooks coming soon. Ransomware, BEC, AD compromise, cloud breach, AI phishing, and crypto wallet drain response procedures.
Knowledge Base
Technical deep-dives across 12 SOC domains, including AI security and Web3/crypto security.
30+ expert articles across SIEM, DFIR, Threat Hunting, Cloud Security, Network, Malware Analysis, Phishing, Identity/IAM, IR, OSINT, AI Security, and Web3 Security.
Latest SOC Jobs
UK cybersecurity roles. SC/DV cleared. Remote and hybrid. Splunk, Sentinel, CrowdStrike.
Job listings coming soon. SC/DV cleared SOC analyst, threat hunter, and IR roles across the UK.